World anti-virus. "A brief guide to anti-virus and anti-trojan programs.
"The world of anti-virus." A short guide to anti-virus and anti-trojan programs. A brief description of more than 40 tools are widely known and...
Specialist
0
Security policy while working in Internet - a technical manual.
This book is designed to help an organization create a coherent Security Policy for the Internet. It provides a brief overview Internet and its protocols. It...
1
DigmasOG
0
Protection of information in automated data processing systems
Information protection in automated data processing systems. Some questions of legal support, licensing and certification in the field of information...
2
shtut
0
Secrets of the hacker (2 books)
This guide "Secrets of a hacker" consists of two books, "Secrets of Super hacker" and "Hackers, crackers, and other information the...
2
Purple Motion
0
Security. Protection against viruses and hackers. Security through its own registry.
Contents: Introduction to the Internet and security therein 1.1. Internet 1.2 Overview of the internal structure of TCP / IP 1.3 Issues related to security...
1
2
jokl
0
How to write a computer virus
Introduction 5 PART 1. COM - VIRUSES 6 CHAPTER 1. DEVELOPMENT OF NON-RESIDENT Virus programs 6 1.1 Download and run COM - Programme 6 1.2 How the...
1
13
jokl
0
B e s o p and with n o s t s W indows in the I nternet What do you much to fear
B e s o p and with n o s t s W indows in the I nternet What do you much to fear
Dienexxx
0
60 Articles for the hacker.
Здесь собрано более 60 статей по хакингу. Взлом, софт, описания, советы. Это стоит тех денег, которые запрошены, т.к. эта коллекция собиралась пару лет. И не...
2
TIA
0
Restoring data on your hard drive
What you will find in this book? For information on how to recover lost data, such as accidental or intentional formatting a disk; how to look for and treat a...
3
BookIzdat
0
Fundamentals of Information Security
It is a theoretical course on information security for beginners in this area and just curious people. This file contains the basic concepts, requirements...
4
Pincod
0
Unique Book Kevin Mitnick
Очень интересная книга по искусству обмана. Написанная самым известным хакером Кевином Митником. Если ты хочешь стать настоящим хакером то обязательно прочитай!
1
5
staffer
0
An elementary guide CRC_algoritmam error detection
Everything you wanted to know about CRC_algoritmah, but were afraid to ask for fear that errors of your knowledge can be found This article focuses on the...
1
3
e_shop
0
PROTECTION FROM UNAUTHORIZED ACCESS LINUX
This document provides an overview of techniques that are required for administrator lyu¬bogo Linux-system. It is described as a general philosophy...
1
7
e_shop
0
Description Protocol ABG, data transmission bank termin
ABG protocol used to authenticate credit card customers in trade organizations, the service sector, as well as ATMs. The information is very valuable for...
3
OnLine SRV
0
Two well-known books on computer security and Internet attacks Attack on Internet
Two of the most famous books on computer security: "Attack of the Internet" and "The attack on the Internet." One price for two books.
1
Leon
0
Territory Internet Fraud All of the most popular methods of fraud in the Internet
Самые популярные способы обмана: Free GSM, порно-сайты, кардинг и многое другое. Конкретные примеры с подробным описанием и разоблачением. off - line версии...
2
IntelFort
0
Illustrated tutorial on developing security
The development of the Internet is pushing the organization to expand their networks. This helps to attract new customers and build relationships with them on...
1
неизвестная
0